Author of the publication

Discretization Based Solutions for Secure Machine Learning Against Adversarial Attacks.

, , and . IEEE Access, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure and simplified access to home appliances using Iris recognition., , and . CIB, page 22-29. IEEE, (2009)Iris recognition using shape-guided approach and game theory., , and . Pattern Anal. Appl., 14 (4): 329-348 (2011)Recognition of unideal iris images using region-based active contour model and game theory., , , and . ICIP, page 1705-1708. IEEE, (2010)Multispectral iris recognition utilizing hough transform and modified LBP., , , and . SMC, page 1396-1399. IEEE, (2014)Iris recognition using Level Set and hGEFE., , , and . SMC, page 1392-1395. IEEE, (2014)Multibiometric System Using Level Set, Modified LBP and Random Forest., , , and . Int. J. Image Graphics, (2014)First Level Hold: A Novel Low-Overhead Delay Fault Testing Technique., , , and . DFT, page 314-315. IEEE Computer Society, (2004)Sub-Domino Logic: Ultra-Low Power Dynamic Sub-Threshold Digital Logic., , and . VLSI Design, page 211-214. IEEE Computer Society, (2001)Efficient Communication Channel Utilization for Mapping FFT onto Mesh Array., , and . Communications in Computing, page 167-176. CSREA Press, (2004)Optimal Dual-VT Design in Sub-100 Nanometer PDSOI and Double-Gate Technologies., , , , , and . VLSI Design, page 125-130. IEEE Computer Society, (2008)